Technology is Not a Substitute for Good Business Processes | Microbyte

Technology is Not a Substitute for Good Business Processes

robot touches human hand

With all the readily available news, it’s important that we never advocate spreading undue concerns or raising anxiety with no justification. But, given the unprecedented rise in hacking and phishing attempts globally in 2018, we feel compelled to draw as much attention as possible to good business practices.

Many of you will have received emails prompting you to click links, sign in here and send money, etc., and you are no doubt always vigilant. However, people will continue to get “caught out” and these risks will increase over the coming months/years.

As an IT company, from a technology perspective we are continuously improving our offerings, and doing what we can to keep our networks secure. Multi-factor Authentication and Identity Protection Services are just two examples which are available and we are of course actively encouraging uptake of these.

As important as the technology, however, are the processes which govern their use (or should). It’s vitally important we all work regularly on our own internal processes to control the flow of data within our businesses.

How can I spot these bad practices?

Some very specific examples where we have seen (what we would perceive as) a lack of validation and controls might be:

  • In-depth phone conversations (and email) with individuals imitating genuine employees, suppliers or customers
  • Large payments made to bank accounts without enough verification as to the destination
  • Attempts to change to details held on record pertaining to individuals working for a company
  • Very few checks in place prior to agreeing to change bank account details and sending funds elsewhere
  • No multiple signoffs for large BACS payments, either verbal or written

These are just some examples where we need to evaluate, with surgical precision, who is allowed to do what within our businesses, where our liabilities lie, and how we double and triple check absolutely anything which potentially has a big risk attached.

As an example of progress, banks are stepping up efforts to provide more secure platforms and verification which is evident all around us. However there will never be enough, and the battle against fraudsters will be eternal. The fact you can still send funds to anywhere, with nothing more than a few numbers, and not even a company name that matches speaks volumes.

The time will come when we will be unable to blame the systems for not protecting us, and more good old-fashioned checklists might just have to make a comeback.

 

 

 

 

 

 

Similar blogs

Do Small Businesses Really Need IT Support

Do Small Businesses Really Need IT Support?

Professional IT support provides the infrastructure management, security controls, and technical maintenance required for smooth daily business operations. Managed IT services replace “Do-It-Yourself” (DIY) and reactive methods with standardised processes that greatly improve system availability, data protection, and regulatory compliance. Why Do Small Businesses Need Professional IT Support? Modern Small and Medium-sized Enterprises (SMEs) use…

Read More

Avatar photo

Do I Really Need 247 IT Support

Do I Really Need 24/7 IT Support?

Your IT systems run continuously, they don’t stop on Friday evening. For SMEs in the UK, USA, and Dubai, “business hours” are a thing of the past because global supply chains and hybrid workforces operate around the clock. This article looks at the need for 24/7 IT support and explains the difference between reactive fixes…

Read More

Avatar photo

Small Business IT Blindspots

Small Business IT Blindspots

Blindspots are never a good thing – especially when it comes to your business.  Small business IT blindspots are unmanaged components within an organisation’s technology infrastructure.  These can be gaps in software, hardware, or day-to-day processes – places the IT team isn’t actively watching. For SMEs in the UK, the US, and Dubai, those blindspots…

Read More

Avatar photo

Top Cybersecurity Risks For Small Businesses

Top Cybersecurity Risks For Small Businesses

Cyberattacks against UK SMEs are extremely common, with between 43% and 50% of UK SMEs having experienced a cyberattack in the last 12 months. These criminals often use automated tools to identify weaknesses in IT systems and run attacks without any human involvement.  Understanding these risks can help SMEs plan appropriate security measures to avoid…

Read More

Avatar photo

How to Build a Scalable IT Infrastructure for UK SMEs

How to Build a Scalable IT Infrastructure for UK SMEs

It’s exciting to build a business that starts to find its feet. Although growing too fast can introduce its own complications. Move quickly enough, and the technology underneath you begins to strain – the tools that once felt effortless start slowing people down.  Your IT setup has to evolve with the team and customer base,…

Read More

Avatar photo